Research Article
The Abnormal Detection for Network Traffic of Power IoT Based on Device Portrait
Table 4
Comparison of the accuracy of different attack types and different algorithms.
| Algorithm | TCP port scan (%) | SYN denial (%) | IP sharding attack (%) |
| Cluster analysis | 91.2 | 90.3 | 90.9 | Logistic regression | 89.5 | 90.5 | 90.5 | Decision tree | 89.1 | 88.3 | 80.3 | Random forest | 88.7 | 78.5 | 85.8 |
|
|